PAM Backdoor
☆32Mar 29, 2023Updated 2 years ago
Alternatives and similar repositories for madlib
Users that are interested in madlib are comparing it to the libraries listed below
Sorting:
- Track your beacons in a redteam scoreboard☆16Oct 28, 2020Updated 5 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- ☆17Jan 9, 2025Updated last year
- CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)☆10Apr 8, 2022Updated 3 years ago
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- ☆42Jun 1, 2025Updated 8 months ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated last year
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Dec 25, 2024Updated last year
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- An automated scanning, enumeration, and note taking tool for pentesters☆13Jul 26, 2022Updated 3 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- Modular C2 server to tame your pack of wolves☆21Jan 7, 2026Updated last month
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Shared library loading application for Linux written in Go.☆16Aug 31, 2020Updated 5 years ago
- ☆50May 4, 2025Updated 9 months ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- Hooking calls to libssl (openssl) to decrypt ssl traffic☆19Nov 16, 2020Updated 5 years ago
- A small, fluid, low-interaction honeypot☆18May 20, 2019Updated 6 years ago
- ☆23Dec 2, 2022Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 3 years ago
- ☆24Jun 9, 2024Updated last year
- It records your terminal, then lets you upload to ASHIRT☆29Feb 11, 2026Updated 2 weeks ago
- Process Dumper written entirely in VBA.☆25Feb 13, 2021Updated 5 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Sep 1, 2023Updated 2 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆23Jul 30, 2024Updated last year
- Prevent in-process process termination by patching exit APIs☆63Nov 9, 2025Updated 3 months ago